摘要
研究了SMS4对差分故障和暴力联合攻击的安全性。这种联合攻击利用传统的故障模型、采用一种简化的差分故障攻击与暴力攻击相结合的方法。在实验中,用该攻击方法不到1分钟就可以恢复出128位的SMS4种子密钥,实验结果表明,SMS4密码算法很难防范这种利用差分故障和暴力攻击的联合攻击。该类型攻击对SMS4具有很大威胁,所以使用SMS4密码算法时,必须对轮函数相关运算进行保护。
On the security of SMS4 against differential fault and brute force combined attack is researched. With a kind of fault model, simplified differential fault attack and brute force attack are together used to crack SMS4 cipher. It takes less than one minute to recover a 128-bit key of SMS4 by experiment. So a conclusion is made in the final that it is difficult for SMS4 to avoid the kind of combined attack. To improve the security of SMS4, the encryption operations should be protected.
出处
《计算机工程与设计》
CSCD
北大核心
2009年第18期4204-4206,共3页
Computer Engineering and Design